Research Paper on "Data Center Design"

Research Paper 4 pages (1201 words) Sources: 4

[EXCERPT] . . . .

company is a reputable organization that offers payroll services to 600 businesses across the United States, and our clients are connected to our Data Center via dedicated circuits. Based on the nature of our business, we are required to deliver a secured data transmission and security boundary to our payroll system within our data center and to the router of each client's network system.

Objective of this paper is to design various techniques to develop a high level Data Center that would consist of security architecture baseline. Information system security is a measure to reduce various threats susceptible to the network and information devices. The network and information security systems that our company intends to design are to protect electronic information transmitted across the network. Thus, the report designs high-level security devices to protect to our architectural systems.

High Level Security Devices

The layout of our Data Center architecture consists of four server farms, which include:

Mail Server Farm

Web Server Farm

Application Server Farm, and Database Server Farm.

The servers require high-level security to protect our sensitive information and client's information. Our organization will employ the following security devises to protect our Data Center:

Firewall

IDS (Intrusion Detection System)

IPS (Intrusion Prevention System )

Firewall is one of the security mechanisms to protect an organizational network. "Firewall is a gateway that enforces a boundar
Continue scrolling to

download full paper
y between two networks and that is used to isolate, filter, and protect local system resources from external connectivity by controlling the amount and kinds of traffic that may pass between the two." (Communication Security, 2007 P. 5). A firewall prevents unauthorized individual to have access to the organizational network resources. Typically, firewall uses different strategies to protect organizational network resources. First, firewall blocks a suspicious network that attempts to penetrate into a company's network resources. Moreover, firewall has ability to filter outgoing and incoming data to protect the company network resources.

Our company will take the advantages of firewall security platform to protect our Application Server, Web Server Farm, Mail Farm and Database Server Farm. To enhance effective security protocol of our network resources, our company also integrates intrusion detection system. Our firewall will assist us to filter the traffic, and "filter or block traffic based on properties of the data communications stream including Traffic Control Protocol (TCP) state, source and destination, conformance with authorized communications protocols, data types embedded within the data communications stream, and contents of the data communications stream. For example, filters may be used to block traffic to or from prohibited IP or MAC addresses or TCP ports." (Communication Security 2007 P. 12).

Intrusion Detection System

Detection control is the second line of security defense for our architectural system. Detection control is critical to our security system to detect whether the security incidents have actually occurs in our information systems.

Prevention control is also very critical for the enhancement of security system. The prevention control such as IPS is an effective tool to prevent an unauthorized access to the company architectural devises. The IPS is used to prevent unauthorized access to it to enhance confidentiality, availability and integrity of the data within the company's information systems.

As being revealed in our company architectural diagram, our company will be connected to the internet that would assist in transmitting and receiving data across the network system. To protect out our system from the negative impact of the internet traffic, the IDS will be installed near the internet network to detect unauthorized network incident. Moreover, the firewall will be used to protect the Mail Server Farm and Web Server Farm. The second… READ MORE

Quoted Instructions for "Data Center Design" Assignment:

Data Center Design Paper

Please write four-page research paper using attached diagram and following information:

Your company is a shared service provider that provides payroll services to 600 small businesses. Your clients are connected to your Data Center via dedicated circuits. Your security boundary consists of delivering secure data transmissions to your payroll system within your Data Center and to the demarcation router of each client's network.

Task Description

Develop a high-level Data Center and security architecture baseline design that will show how your client's data will be transmitted, processed, and stored securely within the Data Center and while in route to and from your client's locations.

Minimum requirements consist of developing your high-level architecture design reflecting your circuits and the placement of your security devices (firewalls, Intrusion Detection Systems or IDSs), the protection tools you will have running to monitor your traffic, along with your encryption solution.

Include the following three sections in your Data Center Design Paper:

1. Architecture Design Drawing reflecting your circuits and the placement of your security devices (firewalls, IDSs).

2. The protection tools you will have running to monitor your traffic along with your encryption solution.

3. Identify the boundary of the Data Center and the representation of the client's boundary location.

Consider using following sources:

Data Center Operations Management. Cisco IT Best Practices.

Guide to computer forensics and investigations, chapter X.

Guide to industrial control systems (ICS). Security, NIST Special Publication, 800-82, chapter 3.

Guidelines for Smart Grid cyber security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements (NISTIR 7628 Vol. 1), chapter 3.

How Cisco IT operates, manages, and protects its Data Center: A Cisco on Cisco case study.

Thank you.

*****

How to Reference "Data Center Design" Research Paper in a Bibliography

Data Center Design.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/company-reputable-organization/6417307. Accessed 4 Oct 2024.

Data Center Design (2013). Retrieved from https://www.a1-termpaper.com/topics/essay/company-reputable-organization/6417307
A1-TermPaper.com. (2013). Data Center Design. [online] Available at: https://www.a1-termpaper.com/topics/essay/company-reputable-organization/6417307 [Accessed 4 Oct, 2024].
”Data Center Design” 2013. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/company-reputable-organization/6417307.
”Data Center Design” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/company-reputable-organization/6417307.
[1] ”Data Center Design”, A1-TermPaper.com, 2013. [Online]. Available: https://www.a1-termpaper.com/topics/essay/company-reputable-organization/6417307. [Accessed: 4-Oct-2024].
1. Data Center Design [Internet]. A1-TermPaper.com. 2013 [cited 4 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/company-reputable-organization/6417307
1. Data Center Design. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/company-reputable-organization/6417307. Published 2013. Accessed October 4, 2024.

Related Research Papers:

Data Centers Research Paper

Paper Icon

centre can be described as a "…computer system's most important and vulnerable component" (What is a Data Center?). In simple terms, a data center is a physical area which houses… read more

Research Paper 15 pages (5439 words) Sources: 15 Topic: Management / Organizations


Data Collection for the Motivation to Three Methodology Chapter

Paper Icon

data collection for the motivation to three preschool criteria, which includes rewards, and no rewards motivation. The chapter also discusses the research design, and research procedures, sources of data, collection… read more

Methodology Chapter 6 pages (1869 words) Sources: 1+ Topic: Education / Teaching / Learning


Data Warehousing as the Senior Analyst Responsible Research Proposal

Paper Icon

Data Warehousing

As the senior analyst responsible for data staging, you are responsible for the design of the data staging area. If your data warehouse gets input from several legacy… read more

Research Proposal 3 pages (983 words) Sources: 0 Topic: Computers / IT / Internet


Data Warehouse Implementation Research Proposal

Paper Icon

Data Warehousing at Wal-Mart

The intent of this paper is to evaluate the data warehousing project Wal-Mart implemented in June, 2007 to streamline business analytics and reporting from its 4,000… read more

Research Proposal 3 pages (974 words) Sources: 2 Style: MLA Topic: Computers / IT / Internet


Data Mining Thesis

Paper Icon

Data Mining

Evaluating Data Mining as a Strategic Technology

The ability to quickly gain insights from a diverse and often incompatibles set of databases and data sets are possible when… read more

Thesis 10 pages (3527 words) Sources: 8 Topic: Computers / IT / Internet


Fri, Oct 4, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!